The content of the invention
A kind of defect it is an object of the invention to overcome prior art, there is provided network identity validation side based on block chainMethod and system.
To achieve the above object, the present invention uses following technical scheme:A kind of network identity validation side based on block chainMethod, comprises the following steps:
User is with true identity information applications network identity ID;
Block catenary system and network identity ID issuers synchrodata;
When user signs in website with network identity ID, network identity validation is completed with network identity ID.
Its further technical scheme is:It is described in the step of user is with true identity information applications network identity IDTrue identity information includes identity card or student's identity card or Hongkong and Macro's pass.
Its further technical scheme is:The step of user is with true identity information applications network identity ID, including withLower specific steps:
User is with true identity information to network identity ID issuers log on identity ID;
Network identity ID issuers carry out real-name authentication;
If real-name authentication does not pass through, log on identity ID is unable to;
Or, if real-name authentication passes through, give user one network identity ID.
Its further technical scheme is:If the real-name authentication passes through, the step of to one network identity ID of user itAfterwards, the network identity ID of user is also recorded including network identity ID issuers.
Its further technical scheme is:If the real-name authentication passes through, the step of to one network identity ID of user, bagInclude step in detail below:
The random number of the identity information+128 of user is assembled into character string;
HASH values are calculated to character string;
Gained HASH values will be calculated as network identity ID, user will be fed back to.
Its further technical scheme is:The step of block catenary system is with network identity ID issuer's synchrodatas,Including step in detail below:
Some node synchronizes data at regular intervals with network identity ID issuers in block catenary system;
By in the network identity ID synchronizations of all grantings and the node that is saved in block catenary system;
The node for preserving the network identity ID of all grantings will be sent the network identity ID being synchronized to other nodes.
Its further technical scheme is:It is described when user signs in website with network identity ID, it is complete with network identity IDThe step of into network identity validation, including step in detail below:
When user signs in website with network identity ID, network identity ID is sent to nearest node by website;
After node receives the request of website transmission, whether there is in data base querying network identity ID;
If network identity ID is present, website is returned to message is proved to be successful;
Or, if network identity ID does not exist, failed message is returned to website.
Present invention also offers a kind of network identity validation system based on block chain, including identity application module, synchronizationModule and authentication module;
The identity application module, for user with true identity information applications network identity ID, with the synchronization moduleConnection;
The synchronization module, for block catenary system and network identity ID issuers synchrodata, tests with the identityCard module connection;
The authentication module, for when user signs in website with network identity ID, being completed with network identity IDNetwork identity validation.
Its further technical scheme is:The identity application module includes sending request submodule, real-name authentication submoduleAnd issue identity submodule;
It is described to send request submodule, for user with true identity information to the log on of network identity ID issuersIdentity ID, is connected with the real-name authentication submodule;
The real-name authentication submodule, real-name authentication is carried out for network identity ID issuers, and identity is issued with describedSubmodule is connected;
It is described to issue identity submodule, for giving user one network identity ID, it is connected with the synchronization module.
Its further technical scheme is:The synchronization module includes synchrodata submodule, preserves submodule and grantingSubmodule;
The synchrodata submodule, for some node in block catenary system and network identity ID issuers everyCertain hour synchronizes data, is connected with the identity submodule that issues;
The preservation submodule, for by the network identity ID synchronizations of all grantings and the section that is saved in block catenary systemOn point, it is connected with the synchrodata submodule;
The granting submodule, for preserve all grantings network identity ID node by the network identity being synchronized toID is sent to other nodes, is connected with the preservation submodule and the authentication module respectively.
Compared with the prior art, the invention has the advantages that:A kind of network identity validation based on block chain of the inventionMethod, by advance log on identity ID, and records in network identity ID issuers, each node in block catenary systemInterior data are all synchronous with network identity ID issuers, when network identity validation is carried out, network identity ID verified, it is only necessary to provide map network identity ID, do not result in true identity leakage, due to block Lian Qu centers, trusted,The characteristics of can not distorting, can greatly improve credit rating, as long as there is part of nodes also in operation in block catenary system, it is ensured thatThe operation of whole system, improves operation stability.
The invention will be further described with specific embodiment below in conjunction with the accompanying drawings.
Specific embodiment
In order to more fully understand technology contents of the invention, technical scheme is entered with reference to specific embodimentOne step introduction and explanation, but it is not limited to this.
Specific embodiment as shown in figs. 1 to 6, a kind of network identity validation side based on block chain that the present embodiment is providedMethod, can be used in the process of confirmation operator's identity in computer and computer network system, realize using network identity IDAuthentication is completed, true identity leakage is not resulted in, raising credit rating is low, and good operation stability.
As shown in figure 1, a kind of network identity validation method based on block chain, comprises the following steps:
S1, user are with true identity information applications network identity ID;
S2, block catenary system and network identity ID issuers synchrodata;
S3, when user signs in website with network identity ID, with network identity ID complete network identity validation.
Above-mentioned S1 steps, user is with true identity information applications network identity ID, it is therefore intended that demonstrate,proved with network identity IDBook identifies user identity, wherein the not real information including user, it is to avoid the leakage of user profile, that improves whole network canReliability, network identity ID here is exactly in fact one section of character string
In addition, above-mentioned S1 steps, the step of user is with true identity information applications network identity ID in, the true bodyPart information includes identity card or student's identity card or Hongkong and Macro's pass.
Certainly, in other embodiment, above-mentioned true identity information can also include other certificates, such as fellow villager's card etc..
Further, as shown in Fig. 2 above-mentioned S1 steps, user is with true identity information applications network identity ID'sStep, including step in detail below:
S11, user are with true identity information to network identity ID issuers log on identity ID;
S12, network identity ID issuers carry out real-name authentication;
If S13, real-name authentication do not pass through, log on identity ID is unable to;
S14 or, if real-name authentication passes through, give user one network identity ID.
If the real-name authentication passes through, the step of to one network identity ID of user after, also including S15, network bodyPart ID issuers record the network identity ID of user, and so all users for applying have in network identity ID issuersRecord, is easy to follow-up data syn-chronization.
In addition, the carrier of network identity ID can be USBKEY, bank card, Mobile phone card etc..
Further, as shown in figure 3, the step of S14, if real-name authentication passes through, giving user one network identity IDThe step of, including step in detail below:
S141, the random number of the identity information+128 of user are assembled into character string;
S142, to character string calculate HASH values;
S143, will calculate gained HASH values as network identity ID, feed back to user.
Using HASH values as network identity ID, when being verified to network identity ID, specifically to the one of HASH valuesString numeral is verified that verification process is simple, efficient and accuracy rate is high, also, prevents the possibility for repeating.
Specifically, above-mentioned S141 steps, the random number of the identity information+128 of user is assembled into character string, hereThe identity information of user can be the identification card number of user.
As shown in figure 4, the step of S2 steps, block catenary system and network identity ID issuer's synchrodatas, bagInclude step in detail below:
Some node and network identity ID issuers synchronize number at regular intervals in S21, block catenary systemAccording to;
S22, by the network identity ID synchronizations of all grantings and the node that is saved in block catenary system;
S23, the node of the network identity ID for preserving all grantings will be sent the network identity ID being synchronized to otherNode.
Above-mentioned S23 steps, it is ensured that the data on any one node are all newest, improve the standard of authenticationExactness.
Also, for S2 steps, block catenary system and network identity ID issuers synchrodata, using due to block chainThe characteristics of removing center, trusted, can not distort, credit rating can be greatly improved.
Further, as shown in figure 5, above-mentioned S3 steps, when user signs in website with network identity ID, use netThe step of network identity ID completes network identity validation, including step in detail below:
S31, when user signs in website with network identity ID, network identity ID is sent to nearest node by website;
After S32, node receive the request of website transmission, whether there is in data base querying network identity ID;
If S33, network identity ID are present, website is returned to message is proved to be successful;
S34 or, if network identity ID does not exist, return failed message to website.
Above-mentioned step S31, when user signs in website with network identity ID, website is sent to network identity ID mostNear node, when network identity validation is carried out, it is only necessary to provide map network identity ID, let out so as to not result in true identityDew.
In addition, S32 steps and S33, S34 step, interact for website with block catenary system, no longer it is that tradition is singleServer, improve operation stability, as long as have in block catenary system part of nodes also operation, it is ensured that whole systemOperation.
A kind of above-mentioned network identity validation method based on block chain, by advance log on identity ID, and recordsIn network identity ID issuers, the data in each node in block catenary system are same with network identity ID issuersStep, when network identity validation is carried out, is verified, it is only necessary to provide map network identity ID, no to network identity IDTrue identity can be caused to reveal, due to block Lian Qu centers, trusted, can not distort the characteristics of, credit can be greatly improvedDegree, as long as there is part of nodes also in operation in block catenary system, it is ensured that the operation of whole system, improves stableProperty.
As shown in fig. 6, being a kind of network identity validation system based on block chain that the present embodiment is proposed, including identity ShenPlease module, synchronization module and authentication module;
Identity application module, for user with true identity information applications network identity ID, is connected with synchronization module;
Synchronization module, for block catenary system and network identity ID issuers synchrodata, connects with authentication moduleConnect;
Authentication module, for when user signs in website with network identity ID, network being completed with network identity IDAuthentication.
Further, identity application module includes sending request submodule 10, real-name authentication submodule 20 and issuesIdentity submodule 30;
Request submodule 10 is sent, for user with true identity information to network identity ID issuers log on bodyPart ID, is connected with real-name authentication submodule 20;
Real-name authentication submodule 20, real-name authentication is carried out for network identity ID issuers, and issues identity submodule30 connections;
Identity submodule 30 is issued, for giving user one network identity ID, is connected with synchronization module.
In addition, synchronization module includes synchrodata submodule 40, preserves submodule 50 and provides submodule 60;
Synchrodata submodule 40, for some node in block catenary system and network identity ID issuers every oneFix time and synchronize data, be connected with identity submodule 30 is issued;
Submodule 50 is preserved, for by the network identity ID synchronizations of all grantings and the node that is saved in block catenary systemOn, it is connected with synchrodata submodule 40;
Provide submodule 60, for preserve all grantings network identity ID node by the network identity ID being synchronized toSend to other nodes, be connected with preservation submodule 50 and authentication module respectively.
Authentication module includes sending identity submodule 70, inquiry submodule 80 and notice submodule 90, sends bodyOne's share of expenses for a joint undertaking module 70, for when user signs in website with network identity ID, network identity ID to be sent to nearest section by websitePoint, is connected with the granting submodule 60;Inquiry submodule 80, after receiving the request of website transmission for node, in databaseInquire about network identity ID whether there is, be connected with identity submodule 70 is sent;Submodule 90 is notified, is proved to be successful for handle and disappearedBreath returns to website or returns to failed message to website, is connected with inquiry submodule 80.
Above-mentioned a kind of network identity validation system based on block chain, by the advance log on body of identity application modulePart ID, and recording in network identity ID issuers, synchronization module is by the data and net in each node in block catenary systemThe synchronization of network identity ID issuers, when network identity validation is carried out, is tested network identity ID using authentication moduleCard, it is only necessary to provide map network identity ID, does not result in true identity and reveals, due to block Lian Qu centers, credibleThe characteristics of appointing, can not distort, credit rating can be greatly improved, as long as there is part of nodes also in operation in block catenary system, with regard to energyEnsure the operation of whole system, improve operation stability.
It is above-mentioned that technology contents of the invention are only further illustrated with embodiment, it is easier to understand in order to reader, but notRepresent embodiments of the present invention and be only limitted to this, any technology done according to the present invention extends or recreates, by of the inventionProtection.Protection scope of the present invention is defined by claims.